{"id":359561,"date":"2025-09-19T19:28:03","date_gmt":"2025-09-19T13:58:03","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=359561"},"modified":"2025-09-19T19:28:03","modified_gmt":"2025-09-19T13:58:03","slug":"kaspersky-discovers-the-return-of-revengehotels-leveraging-ai-in-attacks-on-brazilian-hotels","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/kaspersky-discovers-the-return-of-revengehotels-leveraging-ai-in-attacks-on-brazilian-hotels\/","title":{"rendered":"Kaspersky discovers the return of RevengeHotels, leveraging AI in attacks on Brazilian hotels"},"content":{"rendered":"<p class=\"ArticleBody_date__rpGhG\">Between June and August 2025, Kaspersky\u2019s Global Research and Analysis Team (GReAT) identified a new wave of attacks carried out by RevengeHotels, also known as TA558, a threat group which has been active since 2015. In this campaign, the group targeted the tourism and hospitality sector in Brazil and several Spanish-speaking countries, stealing banking card data from hotel guests. The actor has significantly enhanced its capabilities, adopting new tactics and using AI to expand operations into additional regions.<\/p>\n<div class=\"ArticleBody_articleContainer__Sz0LX\">\n<div class=\"ArticleBody_articleBody__gN8bN\">\n<div class=\"ArticleBody_content__tiVdv ArticleBody_withContentAbove__RyYxL\">\n<p>Although Brazilian hotels are the primary targets of the new campaign, the activity has also extended to Spanish-speaking countries, including Argentina, Bolivia, Chile, Costa Rica, Mexico, and Spain. Earlier another campaign from the same actor was discovered targeting users in Russia, Belarus, Turkey, Malaysia, Italy and Egypt.<\/p>\n<p>The threat actor uses phishing emails disguised as requests for reservation, urging recipients to review the attached documents. The website link in the documents lure the user to install a Remote Access Trojan (RAT) allowing to issue commands which control compromised systems and steal sensitive data. The messages are typically sent to email addresses associated with hotel reservations. In recent cases, however, the theme has shifted to fake job applications, where attackers send CVs in an attempt to exploit potential vacancies at targeted hotels. For payload delivery, the attackers leverage legitimate hosting services, often registering Portuguese-themed domain names.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/content.kaspersky-labs.com\/fm\/press-releases\/6f\/6f2ea9c1fb08a3618286e29a5ec3e507\/processed\/revengehotels-graphics-q93.png\" alt=\"Example of a phishing email about reservation confirmation\" width=\"709\" height=\"443\" \/><em>Example of a phishing email about reservation confirmation<\/em><\/p>\n<p>PowerShell downloaders, a tactic consistent with the group\u2019s attack patterns. VenomRAT is distributed on dark web resources, with a lifetime license costing up to $650. It extends the functionality of QuasarRAT, offering features such as HVNC hidden desktop, file and credential theft, reverse proxy, and UAC exploit. Analysis shows that many of the newly created initial infectors by RevengeHotels include code likely produced using AI.<\/p>\n<p>\u201c<em>Although the actor\u2019s style is still recognizable, this campaign shows some new features: a large part of the initial infector and downloader code appears to be generated using Large Language Model (LLM) agents. This highlights a growing trend of threat actors leveraging AI to expand and evolve their capabilities, which has also been observed in other cybercriminal groups<\/em>,\u201d comments Lisandro Ubiedo, senior security expert at Kaspersky\u2019s Global Research and Analysis Team.<\/p>\n<p>Kaspersky products detect these threats as HEUR:Trojan-Downloader.Script.Agent.gen, HEUR:Trojan.Win32.Generic, HEUR:Trojan.MSIL.Agent.gen, Trojan-Downloader.PowerShell.Agent.ady, Trojan.PowerShell.Agent.aqx.<\/p>\n<p>More information is available in a report on\u00a0<a href=\"https:\/\/securelist.com\/revengehotels-attacks-with-ai-and-venomrat-across-latin-america\/117493\/\" target=\"_blank\" rel=\"noopener\">Securelist.com<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Between June and August 2025, Kaspersky\u2019s Global Research and Analysis Team (GReAT) identified a new wave of attacks carried out by RevengeHotels, also known as TA558, a threat group which has been active since 2015. In this campaign, the group targeted the tourism and hospitality sector in Brazil and several Spanish-speaking countries, stealing banking card [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14083],"tags":[],"class_list":{"0":"post-359561","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-technology-industry-news"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/359561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=359561"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/359561\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=359561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=359561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=359561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}